6
6
stackhpc_firewalld_zones: |
7
7
{% set network_zones = [] %}
8
8
{% for network in network_interfaces %}
9
- {% if network | net_zone is not none %}
9
+ {% if network | net_zone %}
10
10
{% set _ = network_zones.append({'zone': network | net_zone }) %}
11
11
{% endif %}
12
12
{% endfor %}
@@ -18,14 +18,14 @@ stackhpc_firewalld_rules: |
18
18
(stackhpc_storage_firewalld_rules if 'storage' in group_names else []) +
19
19
(stackhpc_monitoring_firewalld_rules if 'monitoring' in group_names else []) +
20
20
(stackhpc_seed_firewalld_rules if 'seed' in group_names else []) +
21
- (stackhpc_seed_hypervisor_firewalld_rules if 'seed_hypervisor ' in group_names else []) +
22
- (stackhpc_wazuh_manager_infra_vm_firewalld_rules if 'wazuh_manager ' in group_names else []) +
23
- (stackhpc_ansible_control_infra_vm_firewalld_rules if 'ansible_control ' in group_names else []) }}
21
+ (stackhpc_seed_hypervisor_firewalld_rules if 'seed-hypervisor ' in group_names else []) +
22
+ (stackhpc_wazuh_manager_infra_vm_firewalld_rules if 'wazuh-manager ' in group_names else []) +
23
+ (stackhpc_ansible_control_infra_vm_firewalld_rules if 'ansible-control ' in group_names else []) }}
24
24
25
25
###############################################################################
26
26
# Controller firewalld rules
27
27
28
- stackhpc_controller_firewalld_rules: |
28
+ stackhpc_controller_firewalld_rules: >-
29
29
{{ stackhpc_controller_firewalld_rules_default |
30
30
selectattr('enabled', 'true') |
31
31
map(attribute='rules') |
@@ -34,7 +34,7 @@ stackhpc_controller_firewalld_rules: |
34
34
selectattr('zone') |
35
35
union(stackhpc_controller_firewalld_rules_extra) |
36
36
unique |
37
- select}}
37
+ select }}
38
38
39
39
stackhpc_controller_firewalld_rules_default:
40
40
# Common
@@ -123,7 +123,7 @@ stackhpc_controller_firewalld_rules_extra: []
123
123
###############################################################################
124
124
# Compute firewalld rules
125
125
126
- stackhpc_compute_firewalld_rules: |
126
+ stackhpc_compute_firewalld_rules: >-
127
127
{{ stackhpc_compute_firewalld_rules_default |
128
128
selectattr('enabled', 'true') |
129
129
map(attribute='rules') |
@@ -132,7 +132,7 @@ stackhpc_compute_firewalld_rules: |
132
132
selectattr('zone') |
133
133
union(stackhpc_compute_firewalld_rules_extra) |
134
134
unique |
135
- select}}
135
+ select }}
136
136
137
137
stackhpc_compute_firewalld_rules_default:
138
138
# Common
@@ -170,7 +170,7 @@ stackhpc_compute_firewalld_rules_extra: []
170
170
###############################################################################
171
171
# Storage firewalld rules
172
172
173
- stackhpc_storage_firewalld_rules: |
173
+ stackhpc_storage_firewalld_rules: >-
174
174
{{ stackhpc_storage_firewalld_rules_default |
175
175
selectattr('enabled', 'true') |
176
176
map(attribute='rules') |
@@ -179,7 +179,7 @@ stackhpc_storage_firewalld_rules: |
179
179
selectattr('zone') |
180
180
union(stackhpc_storage_firewalld_rules_extra) |
181
181
unique |
182
- select}}
182
+ select }}
183
183
184
184
stackhpc_storage_firewalld_rules_default:
185
185
# Common
@@ -214,7 +214,7 @@ stackhpc_storage_firewalld_extra: []
214
214
###############################################################################
215
215
# Monitoring firewalld rules
216
216
217
- stackhpc_monitoring_firewalld_rules: |
217
+ stackhpc_monitoring_firewalld_rules: >-
218
218
{{ stackhpc_monitoring_firewalld_rules_default |
219
219
selectattr('enabled', 'true') |
220
220
map(attribute='rules') |
@@ -223,7 +223,7 @@ stackhpc_monitoring_firewalld_rules: |
223
223
selectattr('zone') |
224
224
union(stackhpc_monitoring_firewalld_rules_extra) |
225
225
unique |
226
- select}}
226
+ select }}
227
227
228
228
stackhpc_monitoring_firewalld_rules_default:
229
229
- rules:
@@ -238,7 +238,7 @@ stackhpc_monitoring_firewalld_rules_extra: []
238
238
###############################################################################
239
239
# Infra VM firewalld rules (Wazuh Manager)
240
240
241
- stackhpc_wazuh_manager_infra_vm_firewalld_rules: |
241
+ stackhpc_wazuh_manager_infra_vm_firewalld_rules: >-
242
242
{{ stackhpc_wazuh_manager_infra_vm_firewalld_rules_default |
243
243
selectattr('enabled', 'true') |
244
244
map(attribute='rules') |
@@ -247,18 +247,14 @@ stackhpc_wazuh_manager_infra_vm_firewalld_rules: |
247
247
selectattr('zone') |
248
248
union(stackhpc_wazuh_manager_infra_vm_firewalld_rules_extra) |
249
249
unique |
250
- select}}
250
+ select }}
251
251
252
252
stackhpc_wazuh_manager_infra_vm_firewalld_rules_default:
253
253
- rules:
254
254
- service: ssh
255
255
zone: "{{ provision_oc_net_name | net_zone }}"
256
256
network: "{{ provision_oc_net_name }}"
257
257
state: enabled
258
- - service: ssh
259
- zone: "{{ switch_mgmt_net_name | net_zone }}"
260
- network: "{{ switch_mgmt_net_name }}"
261
- state: enabled
262
258
- port: 1514/tcp
263
259
zone: "{{ provision_oc_net_name | net_zone }}"
264
260
network: "{{ provision_oc_net_name }}"
@@ -294,7 +290,7 @@ stackhpc_wazuh_manager_infra_vm_firewalld_rules_extra: []
294
290
###############################################################################
295
291
# Infra VM firewalld rules (Ansible Control)
296
292
297
- stackhpc_ansible_control_infra_vm_firewalld_rules: |
293
+ stackhpc_ansible_control_infra_vm_firewalld_rules: >-
298
294
{{ stackhpc_ansible_control_infra_vm_firewalld_rules_default |
299
295
selectattr('enabled', 'true') |
300
296
map(attribute='rules') |
@@ -303,18 +299,14 @@ stackhpc_ansible_control_infra_vm_firewalld_rules: |
303
299
selectattr('zone') |
304
300
union(stackhpc_ansible_control_infra_vm_firewalld_rules_extra) |
305
301
unique |
306
- select}}
302
+ select }}
307
303
308
304
stackhpc_ansible_control_infra_vm_firewalld_rules_default:
309
305
- rules:
310
306
- service: ssh
311
307
zone: "{{ provision_oc_net_name | net_zone }}"
312
308
network: "{{ provision_oc_net_name }}"
313
309
state: enabled
314
- - service: ssh
315
- zone: "{{ switch_mgmt_net_name | net_zone }}"
316
- network: "{{ switch_mgmt_net_name }}"
317
- state: enabled
318
310
enabled: true
319
311
320
312
stackhpc_ansible_control_infra_vm_firewalld_rules_extra: []
@@ -324,7 +316,7 @@ stackhpc_ansible_control_infra_vm_firewalld_rules_extra: []
324
316
325
317
326
318
stackhpc_seed_firewalld_rules: []
327
- # stackhpc_seed_firewalld_rules: |
319
+ # stackhpc_seed_firewalld_rules: >-
328
320
# {{ stackhpc_seed_firewalld_rules_default |
329
321
# selectattr('enabled', 'true') |
330
322
# map(attribute='rules') |
@@ -333,7 +325,7 @@ stackhpc_seed_firewalld_rules: []
333
325
# selectattr('zone') |
334
326
# union(stackhpc_seed_firewalld_rules_extra) |
335
327
# unique |
336
- # select}}
328
+ # select }}
337
329
338
330
# TODO: do
339
331
stackhpc_seed_firewalld_rules_default: []
@@ -346,7 +338,7 @@ stackhpc_seed_firewalld_rules_extra: []
346
338
###############################################################################
347
339
# Seed Hypervisor firewalld rules
348
340
349
- stackhpc_seed_hypervisor_firewalld_rules: |
341
+ stackhpc_seed_hypervisor_firewalld_rules: >-
350
342
{{ stackhpc_seed_hypervisor_firewalld_rules_default |
351
343
selectattr('enabled', 'true') |
352
344
map(attribute='rules') |
@@ -355,7 +347,7 @@ stackhpc_seed_hypervisor_firewalld_rules: |
355
347
selectattr('zone') |
356
348
union(stackhpc_seed_hypervisor_firewalld_rules_extra) |
357
349
unique |
358
- select}}
350
+ select }}
359
351
360
352
# TODO: Check
361
353
stackhpc_seed_hypervisor_firewalld_rules_default:
0 commit comments